Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add CTemplar #292

Merged
merged 1 commit into from
Dec 1, 2021
Merged

Add CTemplar #292

merged 1 commit into from
Dec 1, 2021

Conversation

dngray
Copy link
Member

@dngray dngray commented Nov 11, 2021

Description

Resolves: https://github.com/privacyguides/privacyguides.org/discussions/131
Resolves: privacytools/privacytools.io#1642

Edit: still need to fix logo, for light/dark version

@dngray dngray requested a review from jonaharagon as a code owner November 11, 2021 07:44
@netlify
Copy link

netlify bot commented Nov 11, 2021

✔️ Deploy Preview for privacyguides ready!

🔨 Explore the source changes: daadf50

🔍 Inspect the deploy log: https://app.netlify.com/sites/privacyguides/deploys/61a789d15bae690008d2fa61

😎 Browse the preview: https://deploy-preview-292--privacyguides.netlify.app

@Mikaela Mikaela added the c:providers service providers and similar centralized/federated services label Nov 11, 2021
Copy link
Contributor

@Mikaela Mikaela left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This TBD line doesn't seem like it belongs here.

_includes/legacy/sections/email-providers.html Outdated Show resolved Hide resolved
@pm4rcin
Copy link

pm4rcin commented Nov 11, 2021

I have some problems with adding CTemplar.

  1. They had no backup and data loss occurred. There was no e-mail or any information on the front page. I had only a few messages and didn't lose any but it was enough to close the account. I discovered that it happened accidentally by looking at privacytools Github. I wouldn't know about it otherwise. I really liked transparency like e.g. Gitlab did with their failure handling and this is completely opposite. Here's some info:
    🆕 Software Suggestion | CTemplar privacytools/privacytools.io#1642 (comment)
  2. Regarding tor support they have disabled it today as reported on their twitter: Ctemplar Twitter. I have checked it manually and when logging in it redirects to ctemplar.com.

@dngray
Copy link
Member Author

dngray commented Nov 12, 2021

They had no backup and data loss occurred. There was no e-mail or any information on the front page. I had only a few messages and didn't lose any but it was enough to close the account. I discovered that it happened accidentally by looking at privacytools Github. I wouldn't know about it otherwise. I really liked transparency like e.g. Gitlab did with their failure handling and this is completely opposite. Here's some info:
privacytools/privacytools.io#1642 (comment)

We're aware of this issue and while it isn't ideal, it does seem that the company has taken some serious steps to make sure it never happens again https://github.com/privacyguides/privacyguides.org/discussions/131#discussioncomment-1581612

Regarding tor support they have disabled it today as reported on their twitter: Ctemplar Twitter. I have checked it manually and when logging in it redirects to ctemplar.com.

That is unfortunate. As it is with our current recommendations, only Protonmail has a .onion for their web services and you can't use it for setup of an a new account #151 Mailbox.org only uses it for their IMAP/SMTP connections.

@OneWhiteBird
Copy link

SVG.zip

Edited logos, as requested!

@freddy-m freddy-m marked this pull request as draft November 12, 2021 10:49
@dngray dngray force-pushed the main branch 4 times, most recently from f238a94 to ad74e01 Compare November 20, 2021 10:08
@dngray
Copy link
Member Author

dngray commented Dec 1, 2021

Regarding tor support they have disabled it today as reported on their twitter: Ctemplar Twitter. I have checked it manually and when logging in it redirects to ctemplar.com.

Still seems to be the case

> GET / HTTP/1.1
> Host: mail.ctemplarpizuduxk3fkwrieizstx33kg5chlvrh37nz73pv5smsvl6ad.onion
> User-Agent: curl/7.80.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 301 Moved Permanently
< Server: nginx
< Date: Wed, 01 Dec 2021 13:15:40 GMT
< Content-Type: text/html
< Content-Length: 178
< Connection: keep-alive
< Location: https://mail.ctemplar.com/
<

Worth noting that Protonmail still has this enabled

> GET /login HTTP/1.1
> Host: protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion
> User-Agent: curl/7.80.0
> Accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< date: Wed, 01 Dec 2021 13:18:32 GMT
< last-modified: Sun, 31 Jan 2021 09:41:46 GMT
< accept-ranges: bytes
< content-length: 3309
< vary: Accept-Encoding
< cache-control: max-age=0, no-cache, no-store, must-revalidate
< expires: Wed, 11 Jan 1984 05:00:00 GMT
< set-cookie: Session-Id=Yad2KC3wGVsmJJPzMw5P0QAAAN0; Domain=protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion; Path=/; HttpOnly; Secure; Max-Age=7776000
< set-cookie: Version=default; Path=/; Secure; Max-Age=7776000
< pragma: no-cache
< content-type: text/html; charset=UTF-8
< content-security-policy: default-src 'self'; connect-src 'self' blob:; script-src 'self' blob: 'sha256-eAhF1Kdccp0BTXM6nMW7SYBdV0c3fZwzcC177TQ692g='; style-src 'self' 'unsafe-inline'; img-src http: https: data: blob: cid:; frame-src 'self' blob: https://secure.protonmail.com; object-src 'self' blob:; child-src 'self' data: blob:; report-uri https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/api/reports/csp;
< strict-transport-security: max-age=31536000; includeSubDomains; preload
< expect-ct: max-age=2592000, enforce, report-uri="https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/api/reports/tls"
< x-frame-options: deny
< x-content-type-options: nosniff
< x-xss-protection: 1; mode=block; report=https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/api/reports/csp
< referrer-policy: strict-origin-when-cross-origin
< x-permitted-cross-domain-policies: none
<

@OneWhiteBird
Copy link

Regarding tor support they have disabled it today as reported on their twitter: Ctemplar Twitter. I have checked it manually and when logging in it redirects to ctemplar.com.

Still seems to be the case

> GET / HTTP/1.1
> Host: mail.ctemplarpizuduxk3fkwrieizstx33kg5chlvrh37nz73pv5smsvl6ad.onion
> User-Agent: curl/7.80.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 301 Moved Permanently
< Server: nginx
< Date: Wed, 01 Dec 2021 13:15:40 GMT
< Content-Type: text/html
< Content-Length: 178
< Connection: keep-alive
< Location: https://mail.ctemplar.com/
<

Worth noting that Protonmail still has this enabled

> GET /login HTTP/1.1
> Host: protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion
> User-Agent: curl/7.80.0
> Accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< date: Wed, 01 Dec 2021 13:18:32 GMT
< last-modified: Sun, 31 Jan 2021 09:41:46 GMT
< accept-ranges: bytes
< content-length: 3309
< vary: Accept-Encoding
< cache-control: max-age=0, no-cache, no-store, must-revalidate
< expires: Wed, 11 Jan 1984 05:00:00 GMT
< set-cookie: Session-Id=Yad2KC3wGVsmJJPzMw5P0QAAAN0; Domain=protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion; Path=/; HttpOnly; Secure; Max-Age=7776000
< set-cookie: Version=default; Path=/; Secure; Max-Age=7776000
< pragma: no-cache
< content-type: text/html; charset=UTF-8
< content-security-policy: default-src 'self'; connect-src 'self' blob:; script-src 'self' blob: 'sha256-eAhF1Kdccp0BTXM6nMW7SYBdV0c3fZwzcC177TQ692g='; style-src 'self' 'unsafe-inline'; img-src http: https: data: blob: cid:; frame-src 'self' blob: https://secure.protonmail.com; object-src 'self' blob:; child-src 'self' data: blob:; report-uri https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/api/reports/csp;
< strict-transport-security: max-age=31536000; includeSubDomains; preload
< expect-ct: max-age=2592000, enforce, report-uri="https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/api/reports/tls"
< x-frame-options: deny
< x-content-type-options: nosniff
< x-xss-protection: 1; mode=block; report=https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/api/reports/csp
< referrer-policy: strict-origin-when-cross-origin
< x-permitted-cross-domain-policies: none
<

Regarding CTemplar, it is correct. Until the CORS issue is fixed, all the API requests using Tor Browser through the .onion domain will not work. So we have decided to redirect the users to our clearnet domain, until it is fixed.

@dngray dngray marked this pull request as ready for review December 1, 2021 13:46
@dngray dngray requested a review from freddy-m December 1, 2021 13:46
@dngray
Copy link
Member Author

dngray commented Dec 1, 2021

I think this one is ready for review/merge.

Copy link
Member

@freddy-m freddy-m left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@dngray dngray merged commit daadf50 into main Dec 1, 2021
@dngray dngray deleted the pr-ctemplar branch December 1, 2021 14:42
@ghost ghost mentioned this pull request Dec 29, 2021
@ghost ghost mentioned this pull request Jan 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:providers service providers and similar centralized/federated services
Projects
None yet
Development

Successfully merging this pull request may close these issues.

🆕 Software Suggestion | CTemplar
5 participants